Font Size: a A A

Research And Implementation Of Security Protocol In Mobile Value-Added Services Network

Posted on:2008-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:P HeFull Text:PDF
GTID:2178360215482695Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Mobile communication has become one of the fastest-growing telecommunication fields in the world. In recent years, China's mobile communications industry has always maintained a good momentum of rapid development. Network and user capacity are on the top in the world. Meanwhile, as the traditional voice service has becoming saturated and the rapid growth of mobile value-added services, many members of the telecom industry will have to focus on the field of mobile value-added services. Such as mobile payment, mobile commerce and other services with strict economic security, these value-added services applications have more stringent requirements for security. This paper focuses on the second generation, third generation mobile communications network security and safety of the mobile value-added services. Detailed study of authentication, encryption and user protection mechanisms in the second-generation GSM network; detailed study of data integrity and network security protection different from the second-generation mobile networks in the third generation mobile communication network; Research on some of the current mainstream mobile value-added business applications. In the end this paper proposed a number of new value-added business applications, and has a detailed analysis for its application and concrete realization. In order to better meet the needs of mobile value-added service, a smart card like SIM card has been proposed to ensure the safety of the end-to-end security based on a third-party key distribution. The main innovations are summarized as below:With respect to the applications in the mobile value-added business, proposed a timing short message based on the traditional Short Message Service, this timing short message service can be implemented on the mobile terminal, and also be implemented on the Mobile Short Message Server. This service can provide users to send short message in a given time; Because of the close relativity between users and mobile terminals, as well as the increasing popularity of the mobile terminals, this paper has presented a mobile information platform, the sources of the information for platform are mainly based on users, this platform transits information through SMS or voice. In this application, the user is the main source of information, and also is the main users for the information. Information subscribers send the information to mobile information interactive center, Users of information inquire information through the mobile interactive information center and get needed information from it.For mobile terminal, this paper has submitted a smart card of security like SIM card to support security in mobile value-added services. In the smart card of security, mobile value-added service providers write its special authentication and encryption algorithm, and the sharing key between services provider and users. Realizing the different types of security and different levels of security standards, meanwhile, mobile value-added service providers have the choice of the algorithm and key. Then the value-added service providers can break away from the chain of mobile network operators in the security.In the end-to-end security, has proposed a new project. Key center distribute key to end users through a encrypted and safe channel. Key center and users share the same key and encryption, authentication algorithm. So the security key distributed by key center can be safely transmitted from key center to end user.
Keywords/Search Tags:End-to-end security, Security Control Center, Session Key for Security, Smart Card of Security, Interactive Platform of Mobile Information
PDF Full Text Request
Related items